A vulnerability is a weakness or issue within a system, software, or application that could be exploited by a malicious party or hacker to gain unauthorized access to an organization.
For vulnerabilities in commercial products, there is a system maintained by the MITRE corporation that is known as the Common Vulnerability and Exposure (CVE) system, in which a unique number is assigned to each CVE based upon timing of the discovery within a year. Whether vulnerabilities occur in the custom software an organization has created or in the commercial products they use, organizations almost always have far more vulnerabilities that need to be addressed than they can address in a timely manner, which is why there has been growing interest in risk-based vulnerability management.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Learning Center > Vulnerability Assessment
Vulnerability Detection Tools: Key Features & 7 Tools You Should Know
Vulnerability detection tools are software applications used to identify, assess, and manage vulnerabilities within a network or system.
Learning Center > Vulnerability Assessment
Complete Guide to Vulnerability Scanning
Vulnerability scanning is an automated method that systematically scans a system or a network to identify potential security threats.
Learning Center > Vulnerability Management
What Is Vulnerability Management? Process, Tools & Tips
Vulnerability management is a comprehensive approach to identifying and reporting on security vulnerabilities in systems and the software they run.